C:\vmagent_new\bin\joblist\766478\out\Release\GameChrome.pdb
Static task
static1
Behavioral task
behavioral1
Sample
11fabc02f533ceb840f9eb412ed4ce70b36b97077ea1c5cafa8a341b9580de34.exe
Resource
win7-20240705-en
General
-
Target
11fabc02f533ceb840f9eb412ed4ce70b36b97077ea1c5cafa8a341b9580de34
-
Size
539KB
-
MD5
50f63ffdd5e7d27e713607563f929353
-
SHA1
442239316b936b73fbea299ea5620d11bb545441
-
SHA256
11fabc02f533ceb840f9eb412ed4ce70b36b97077ea1c5cafa8a341b9580de34
-
SHA512
710ec76fc513c34f98b43d11bc5768a3cbd005ed0e90ba88923c09b6c8ddf3748b6068ae5b01eec089fcaa5473aaaf0ab024311ff53dac5fba0dca3d44a4f59f
-
SSDEEP
12288:3vgElAzLRkAcYGe50rzlAGyELTYLao4+bN+Std10d:3vl6+e50rzlAWTY7bb10d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11fabc02f533ceb840f9eb412ed4ce70b36b97077ea1c5cafa8a341b9580de34
Files
-
11fabc02f533ceb840f9eb412ed4ce70b36b97077ea1c5cafa8a341b9580de34.exe windows:5 windows x86 arch:x86
0126211654f1d41525fc8d722f82692f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTime
SystemTimeToFileTime
LoadLibraryW
GetFileType
SetFilePointer
WriteFile
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileA
LocalFileTimeToFileTime
LocalFree
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
RaiseException
SetLastError
SetThreadAffinityMask
GetCurrentThread
QueryPerformanceCounter
OpenFileMappingW
Sleep
SetEvent
ExitProcess
GetSystemTimeAsFileTime
CreateEventW
CreateMutexW
VirtualFreeEx
InterlockedDecrement
OutputDebugStringW
DecodePointer
MapViewOfFileEx
GetBinaryTypeW
ProcessIdToSessionId
GetFileSizeEx
SetFilePointerEx
FormatMessageW
TlsSetValue
HeapLock
ReleaseMutex
HeapWalk
TlsAlloc
TlsGetValue
TlsFree
HeapUnlock
OpenThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetACP
GetStdHandle
GetCommandLineW
GetCommandLineA
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
RtlUnwind
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
GetCPInfo
GetStringTypeW
LCMapStringW
EncodePointer
ReadFile
GetCurrentProcess
OpenProcess
TerminateProcess
lstrcmpiW
WaitForSingleObject
CreateThread
HeapDestroy
FindClose
FindNextFileW
SetFileAttributesW
GetLastError
CreateDirectoryW
EnterCriticalSection
LeaveCriticalSection
CreateProcessW
InitializeCriticalSection
DeleteCriticalSection
FreeLibrary
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
GetModuleHandleW
GetCurrentProcessId
CloseHandle
DeviceIoControl
CreateFileW
DeleteFileW
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InterlockedIncrement
WriteConsoleW
user32
DispatchMessageW
TranslateMessage
PeekMessageW
GetWindowThreadProcessId
GetDC
ScreenToClient
GetCursorPos
PostMessageW
GetMessageW
DefWindowProcW
DestroyWindow
IsWindow
UnregisterClassW
RegisterClassExW
GetClassInfoExW
LoadCursorW
CreateWindowExW
SetWindowLongW
GetWindowLongW
CallWindowProcW
RegisterWindowMessageW
SendMessageW
PostQuitMessage
FindWindowW
GetKeyState
SetFocus
SetParent
KillTimer
SetTimer
CharNextW
SetWindowPos
GetParent
ShowWindow
gdi32
GetDeviceCaps
advapi32
RegQueryValueExA
ConvertSidToStringSidW
GetUserNameW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
RegQueryValueExW
RegEnumKeyExW
GetTokenInformation
OpenProcessToken
RegQueryInfoKeyW
RegCloseKey
RegOpenKeyExW
shell32
DragQueryFileW
SHFileOperationW
SHGetFolderPathW
CommandLineToArgvW
ole32
RevokeDragDrop
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
VarUI4FromStr
SysAllocString
shlwapi
StrStrIA
SHDeleteKeyW
PathIsRootW
PathRemoveFileSpecW
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
SHGetValueW
PathAppendW
PathFindFileNameW
PathCombineW
SHSetValueW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
psapi
GetProcessImageFileNameW
Exports
Exports
??0ShellResourceRequestDetails@@QAE@XZ
??1ShellResourceRequestDetails@@QAE@XZ
??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
Sections
.text Size: 286KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 85KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE